Skip to content

Commit fb13ed3

Browse files
[PR sublime-security#3708] modified rule: Attachment: PDF with structured URL paths and social engineering keywords
1 parent a218405 commit fb13ed3

File tree

1 file changed

+1
-13
lines changed

1 file changed

+1
-13
lines changed

detection-rules/3708_attachment_pdf_uuidv7_suspicious_sender.yml

Lines changed: 1 addition & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,6 @@ source: |
1313
regex.imatch(.path,
1414
'^/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/app/[\w?a-fA-F0-9-]+/(?:latest|view|access)$'
1515
)
16-
1716
// Contains social engineering keywords in path
1817
and regex.icontains(.path,
1918
'DOCUMENT|SECURE|REVIEW|SHARED|FILE|VIEW|ACCESS|MESSAGE'
@@ -22,22 +21,11 @@ source: |
2221
and regex.imatch(.path,
2322
'.*/(?:latest|current|view|access|open|v[0-9]+)$'
2423
)
25-
2624
// Not legitimate file sharing services
2725
and not .domain.root_domain in $free_file_hosts
2826
)
2927
)
3028
)
31-
32-
// Not from highly trusted domains with valid DMARC
33-
and (
34-
(
35-
sender.email.domain.root_domain in $high_trust_sender_root_domains
36-
and not coalesce(headers.auth_summary.dmarc.pass, false)
37-
)
38-
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
39-
)
40-
4129
attack_types:
4230
- "Credential Phishing"
4331
- "BEC/Fraud"
@@ -53,4 +41,4 @@ detection_methods:
5341
id: "c85e1c9b-37ce-503d-a983-af72e0a0fe48"
5442
og_id: "0b8e7164-2184-54ef-ad2a-39760720effb"
5543
testing_pr: 3708
56-
testing_sha: 9c9820584a0cac75e4adebb89f04fc0f7e19f76f
44+
testing_sha: e98109587803fd690e78839484dabdae663a6264

0 commit comments

Comments
 (0)